Q: Who is at risk from
an insider attack?
A: You.

It's no secret that cybercrime is a major problem
for all types of organizations.

Description

It's no secret that cybercrime is a major problem for all types of organizations.
Bad actors are relentless in their attempts to steal and abuse trade secrets, business development plans, marketing strategies, client and employee data, and other sensitive information.
The result: firms are hurt and can even be destroyed by huge financial losses, damaged reputations, legal issues, even governmental penalties.

60%

60% of individuals leaving to work
for a competitor offered to share confidential
information from their prior job

You may be typical in devoting major resources to protecting your systems from such outside attacks. But now organizations are waking up to the rise of a different threat, one that can be even harder to deal with: attacks by individuals within the organization.

In a recent Vormetric Insider Threat Report, a Harris Poll survey found that 89% of global senior business managers and IT professionals polled now consider their companies to be more at risk from an insider attack, with 34% believing they are “very” or “extremely” vulnerable. Why?

Security experts Symantec discovered that 50% of employees who left or lost their jobs kept confidential information, and 40% planned to use it in their new jobs. In fact, 60% of individuals leaving to work for a competitor offered to share confidential information from their prior job. Furthermore, the 2014 US State of Cybercrime Survey showed that almost one third of respondents said insider crimes are more costly or damaging than incidents perpetrated by outsiders.

Please choose the action

Amiya—A Trusted Partner

We covering incident management From every angle, working closely with leading companies
whose products and technology complement our vision.

IBM Business Partner

VMware Professional
Solution Provider

Cisco Premier
Certified Partner

Common Approaches

Businesses have availed themselves of an increasing number of options to detect and prevent inside threats from intentional attacks as well as mistakes by careless workers.
These measures range from basic practices such as data security audits, educating employees about security policies, and clarifying penalties for violations to restricting access, prohibiting portable media and Wi-Fi data transfers—and monitoring employees.
Many of these steps tend to be expensive and time-consuming to implement and manage, draining precious resources from other important needs. Additionally, while malicious insiders are a very real threat, monitoring every individual can backfire. After all, loyal team members do not appreciate being treated as suspects.

Another Way to Guard
Against Internal Threats

Fortunately, there’s a simpler, smarter answer—rather than monitoring individual employees and contractors, use Amiya’s ALog SMASH to monitor the files on your servers.
Servers operating systems create log files with information about files and actions. ALog SMASH uses this information to identify who accessed the servers, which files they opened, what they did to the files, and when. Server access log analysis is an efficient way to protect critical data without the problems of endpoint security.

Watch your data, not your employees.
Use ALog SMASH

Amiya’s ALog SMASH is the No. 1 product in Japan’s server access log market,
used by major firms in manufacturing, insurance and finance, media, IT and
communications, construction, and many other sectors. The powerful software
collects log data used to monitor access to servers storing important
information accessible through endpoints. Because it works at the server level,
ALog SMASH costs less to run than client PC log monitoring tools. It can also
monitor the status of all access to your crucial data.

Converts log files to
actionable information

The raw log data is converted into a simple, clear format that provides an immediate grasp of each file’s access status.

02
Ultra-compression reduces converted files to less than 1/40,000
their original size

Ultra-compression: less
than 1/40,000 original size

The conversion process also compresses the log files to the absolute minimum size, enabling long-term storage of the files.

03
Files are indexed for easy search

Indexes files for easy search

Files can be searched and examined directly in conventional web browsers for simple, intuitive operations. This allows even non-technical personnel to examine and analyze the files.

04
Customizable settings make detection easier and more efficient

Set conditions to receive an alert when certain actions are detected.
Improved security detects unauthorized user access or suspicious activity.

It’s the right choice.

Agentless: places zero impact on your current system's performance

Simple: extremely easy to install, learn, manage, and maintain

Fully scalable: grows right along with you, but without the hassles of reconfiguration

Flexible: adaptable to a wide range of systems and applications

Intuitive: self-assessing intelligent software works automatically, freeing up valuable time and labor

Invisible: works in the background at the server level, so your employees can focus on their tasks without distractions

Inexpensive: contact us to see how much powerful security you can get for your money!

Please choose the action

Buy Now

ALog SMASH
Download Free Trial

Contact Amiya

Install ALog SMASH on the servers
where the data to be protected is stored

ALog SMASH is agentless—it installs directly on your existing file server. This saves tremendous effort and expense, since there's no need to buy any new, additional server or set up a new database.

Furthermore, ALog SMASH utilizes the OS event log for the access log containing the records of operations performed via the server. There is no agent (resident program) used to record these logs, making ALog SMASH light and lean, low-trouble, low-maintenance solution.

Easy to Install

Installation takes only about a minute to complete, and there's absolutely nothing difficult or complicated involved. The settings wizard makes the initial setup a snap—even individuals unfamiliar with the system will find the settings simple and easy, allowing them to get an immediate start on managing their log files.

1. Select log file to be saved…

2. Determine the duration…

3. Set the folder to be monitored!

Please choose the action

Buy Now

ALog SMASH
Download Free Trial

Contact Amiya

Major Customers

For the past eight years, ALog SMASH has been the number one choice among Japanese companies looking for a no-hassle on-server data security product. Companies like: